Journal of Cyber Security, Privacy Issues and Challenges最新文献

筛选
英文 中文
The Cyber Forensics and The Ipc Laws For Cyber Criminal’s 针对网络犯罪的网络取证和Ipc法律
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2022-07-04 DOI: 10.46610/jcspic.2022.v01i03.001
Shivam Jaiswal, H. Patil
{"title":"The Cyber Forensics and The Ipc Laws For Cyber Criminal’s","authors":"Shivam Jaiswal, H. Patil","doi":"10.46610/jcspic.2022.v01i03.001","DOIUrl":"https://doi.org/10.46610/jcspic.2022.v01i03.001","url":null,"abstract":"Our lives have become increasingly dependent on computers. We do things differently because of them. Cybercrime is steadily rising as a result. Criminal activity has become a global phenomenon, and criminals have realized that, to continue their criminal activity, they must keep up with the times. The need to determine precisely what happened is therefore critical. A technique known as \"cyber forensics\" can aid this process. The global phenomenon has been impacted by Cybercriminals that have adapted more advanced tools and tactics. Anti-forensic techniques are also being used by these attackers to disguise evidence of cybercrime. . Cybercrime refers to the crimes/offenses committed online. Cyber law was introduced to stop or punish cyber criminals. As a branch of law, cyber-law focuses on cyberspace, the Internet, and legal issues.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131030512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review on Cybersecurity & Data Protection 网络安全与数据保护系统综述
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2022-06-16 DOI: 10.46610/jcspic.2022.v01i02.002
Ryan Nambiar, Flavia Gonsalves
{"title":"A Systematic Review on Cybersecurity & Data Protection","authors":"Ryan Nambiar, Flavia Gonsalves","doi":"10.46610/jcspic.2022.v01i02.002","DOIUrl":"https://doi.org/10.46610/jcspic.2022.v01i02.002","url":null,"abstract":"This paper identifies the understanding of Cybersecurity. This paper analyses the awareness, presence and challenges of Cybersecurity and Data protection. This paper also identifies what people think about Cybersecurity as well as measures we can use to strengthen Cybersecurity.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131789117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the Effects of Software Reuse in Project Development 软件重用在项目开发中的作用研究
Journal of Cyber Security, Privacy Issues and Challenges Pub Date : 2022-06-15 DOI: 10.46610/jcspic.2022.v01i02.001
Sujeet Devadatta Gawade, H. Patil
{"title":"Research on the Effects of Software Reuse in Project Development","authors":"Sujeet Devadatta Gawade, H. Patil","doi":"10.46610/jcspic.2022.v01i02.001","DOIUrl":"https://doi.org/10.46610/jcspic.2022.v01i02.001","url":null,"abstract":"Software reuse is the process of reusing software resources. In a new application, all stages of the software development process. Given the high cost and difficulty of building high-quality software, the idea of leveraging earlier software investments is intriguing; yet, software reuse has not shown to be as effective as anticipated and is not widely or systematically adopted in business.","PeriodicalId":359542,"journal":{"name":"Journal of Cyber Security, Privacy Issues and Challenges","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信